3rd International Conference on Security of Information and Networks (SIN 2010)
3rd International Conference on Security of Information and Networks (SIN 2010)
3rd International Conference on Security of Information and Networks (SIN 2010)
Дата начала: 07.09.2010 Дата окончания: 11.09.2010 Место проведения: Taganrog, Russia | Сайт конференции http://www.sinconf.org/sin2010~ |
Организаторы
- Dept. of Security of Information Technologies
- South-Russian Regional Scientific-Educational Center for Information Security Problems
- Southern Federal University, Taganrog, Rostov, Russia
- Internet Technologies Research Center
- Eastern Mediterranean University, North Cyprus
- The Information and Networked Systems Security (INSS) & The Intelligent Systems Group (ISG)
- Dept. of Computing, Macquarie University, Australia
- CASED Research Center for IT Security, Technische Universitä
- t Darmstadt, Germany
- Supported by
- (some pending)
- Unitary State Enterprise "Sistemprom", Moscow, Russia
- National Research Nuclear University "MEPhI", Moscow, Russia
- Russian Foundation for Basic Research
- National Research Institute of Electronics and Cryptology (UEKAE), Turkey
- IEEE Turkey Section
- IEEE Computer Society Turkey Branch
- Chamber of Computer Engineers, TRNC, North Cyprus
- Internet Technologies Association (INETD), Turkey
- Linux Users Association (LKD), Turkey
- TBD further
Описание конференции
Papers addressing all aspects of security in information and networks are being sought. Researchers working on the following and related subjects are especially encouraged: realization of security schemes, new algorithms, experimenting with existing approaches; secure information systems, especially distributed control and processing applications, and security in networks; interoperability, service levels and quality issues in such systems; information assurance, security, and public policy. Doctoral students are encouraged to propose papers on ongoing research.
Original papers will be considered; submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop that has proceedings. All submitted papers will be reviewed by at least three members of the program committee judging its originality, significance, correctness, presentation and relevance. Authors are also encouraged to propose position papers on practical studies and experiments, critique of existing work, emerging issues, and novel ideas under development.
Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demo.
Half-day tutorials on fundamental to advanced subjects covering practical implementation aspects of security are welcome.
Proposals of special session(s) to be held in the main conference are welcome.
Proposals are invited for workshops to be held in conjunction with SIN 2010 Conference. The workshop proposal theme should be closely related to the conference topics.
Broad areas of interest in security theory, technology and applications will include, but are not limited to, the following:
* Access control and intrusion detection
* Autonomous and adaptive security
* Cryptographic techniques and key management
* Information assurance
* Network security and protocols
* Security in information systems
* Security tools and development platforms
* Security ontology, models, protocols & policies
* Secure ontology-based systems
* Standards, guidelines and certification
* Security-aware software engineering
* Trust and privacy
Following is a non-exhaustive list of subtopics of interest:
* Agent & MAS security
* Authentication & authorization
* Cryptographic hardware design
* Cryptography and cryptanalysis (symmetrical and asymmetrical)
* Digital signature
* Executables security
* Information security development processes
* Intrusion & fraud detection
* Malicious codes
* Mobile code and agent security
* Privacy
* Scripts and languages
* Side-channel attacks
* Signals & security
* Securing storage: SAN/NAS security
* Security ontology, models, protocols & policies
* Semantics of security
* Software security and testing
* Spam counter measures
* Steganography
* Vulnerability analysis
* Web security
* Wireless security
Original papers will be considered; submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop that has proceedings. All submitted papers will be reviewed by at least three members of the program committee judging its originality, significance, correctness, presentation and relevance. Authors are also encouraged to propose position papers on practical studies and experiments, critique of existing work, emerging issues, and novel ideas under development.
Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demo.
Half-day tutorials on fundamental to advanced subjects covering practical implementation aspects of security are welcome.
Proposals of special session(s) to be held in the main conference are welcome.
Proposals are invited for workshops to be held in conjunction with SIN 2010 Conference. The workshop proposal theme should be closely related to the conference topics.
Broad areas of interest in security theory, technology and applications will include, but are not limited to, the following:
* Access control and intrusion detection
* Autonomous and adaptive security
* Cryptographic techniques and key management
* Information assurance
* Network security and protocols
* Security in information systems
* Security tools and development platforms
* Security ontology, models, protocols & policies
* Secure ontology-based systems
* Standards, guidelines and certification
* Security-aware software engineering
* Trust and privacy
Following is a non-exhaustive list of subtopics of interest:
* Agent & MAS security
* Authentication & authorization
* Cryptographic hardware design
* Cryptography and cryptanalysis (symmetrical and asymmetrical)
* Digital signature
* Executables security
* Information security development processes
* Intrusion & fraud detection
* Malicious codes
* Mobile code and agent security
* Privacy
* Scripts and languages
* Side-channel attacks
* Signals & security
* Securing storage: SAN/NAS security
* Security ontology, models, protocols & policies
* Semantics of security
* Software security and testing
* Spam counter measures
* Steganography
* Vulnerability analysis
* Web security
* Wireless security